A set of middle ware programs and tools that provide the underlying base that enable applications to be inter-operable across operating systems. SAP Basis includes a RDBMS, GUI, and client server architecture. It's a piece of middle ware which links the application with the database and the operating system. Basis is most commonly associated with the GUI interface to the SAP.

4. On the Create new profile popup,
type in a new Profile name and click the green √ picture-icon.

5. On the Filter 1 tab of the
Security Audit: Administer Audit Profile screen, click the icon to the left of Filter active to place a √ in the box. In the Selection criteria section, select the Clients and User names to be traced. In the Audit classes section, click “on” all the auditing functions you need for this profile. In the Events section, click the radio button to the left of the level of auditing you need. Once you have entered all your trace information, click the Save picture-icon. You will receive an Audit profile saved in the status bar at the bottom of the screen.

6. Please note that while the user
trace profile has been saved, it is not yet active. To activate the user trace, see the next section Activating a User Audit Profile.

7. You may now leave the SM19
transaction.

Activating a User Audit Profile :-

1. Log on to any client in the
appropriate SAP system.

2. Go to transaction SM19.

3. On the Security Audit: Administer
Audit Profile screen, select the audit profile to be activated from the Profile drop down. Click the lit match picture-icon to activate it. You will receive an Audit profileactivated for next system start in the status bar at the bottom of the screen. The audit will not beginuntil after the SAP instance has been recycled.

4. You may now leave the SM19
transaction.

Viewing the Audit Analysis Report :-

1. Log on to any client in the
appropriate SAP system.

2. Go to transaction SM20.

3. In the Selection, Audit classes,
and Events to select sections of the Security Audit Log: Local Analysis screen, provide your information to filter the audit information. If you need to trace the activities of a specific user, be sure to include that user’s ID. Click the Re-read audit log button.

4. The resulting list is displayed.
This list can be printed using the usual methods.